Assignment Lanka,Assignment,Projects,Telecommunication,Free download,IT projects,Study,Information Technology,Free, White papers,IT free, assignmentlanka,assignment, lanka, Lanka Assignments,Assignment students,Sri Lanka Assignment, Sri Lanka Assignments, Sri Lanka, News line
One of our course objectives is to become a better writer in a about the Assignments,Form the binging we try to introduce some sample assignment with IT projects and in future we plan to expand the product.

Wednesday, November 14, 2012

Token Passing Network

In token passing system,
all stations are logically connected in the form of a ring and Manage of the admission
to the medium is performed using a token. A token is an individual bit Guide or
a tiny packet, more often than not several bits in length, which flow from node
next node. Token passing can be used with both broadcast (token bus) and in
order Connected (token ring) type of networks with some difference in the
details as considered.

In case of token ring,
token is passed data packets from a node to the physically neighboring node. On
the other hand, in the token bus, token is passed with the assist of the MAC address
of the computer which logical design in a ring. In either case a node currently
holding the token has the’ right to transmit’. Whenit has got data to send, it
removes the token and transmits the Data and then forwards
the token to the next logical or physical computer tokens in the ring. If a
node Currently holding the
token has no data to send, it simply forwards the token to the next. The token
passing scheme is resourceful compare to the polling technique, but it Realize on the correct
and reliable operation of all the nodes. There exists a number of

Potential problems, such
as lost token, duplicate token, and insertion of a node, removal Of a node, this must be
tackled for correct and reliable operation of this scheme.

Token passing protocol

The token passing protocol relies on a manage signal called
the token. A token is a 24-bit packet that circulates all the way through the token
passing network from NIC to NIC in an arranged manner. If a workplace wants to
transmit a communication, first it must grab the token. At that end, the workplace
has absolute manage over the communications channel. The subsistence of only
one token eliminates the option of signal collision. This means that only one
station can speak at a time. Token authentication may be a physical device that
an authorized user of computer services is given to ease authentication. The
term may also refer to software tokens. Token authentication is used to prove
one's identity automatically the token is used in addition to or in place of a
password to prove that the client is who they claim to be. Controlling network
access the token acts like an electronic key to access something.

Some may store cryptographic keys, such as a digital
signature, or biometric data, such as fingerprint minutiae. Some designs
feature tamper resistant packaging, while others may include small keypads to
allow entry of a PIN or a simple button to start a generating routine with some
display capability to show a generated key number. Special design includes a
USB connector, RFID functions or Bluetooth wireless interface to enable
transfer of a generated key number series to a client system.